Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
-
Updated
May 30, 2024 - Go
Open source authorization service inspired by Google Zanzibar to build fine-grained and scalable authorization systems.
Catalog and understand risks from granting IAM privileges
🔐 Lightning fast, global scale authorization service without the overhead of yet another DSL.
Rapid7 | insightCloudSec | Kubernetes RBAC Power Toys - Visualize, Analyze, Generate & Query
The GenCyber 10 Security First Principles are a set of fundamental best practices and guidelines for cybersecurity
command line interface for Permify
Generate an IAM policy from AWS, Azure, or Google Cloud (GCP) calls using client-side monitoring (CSM) or embedded proxy
Find AWS IAM permissions used by Go code
Create a break glass role for emergency use in order to limit AWS production account access. Configure automatic alerts and logging of activities in the role to secure its use in production environments.
Cloud governance reports from native services in a clear and readable digest
This project shows a complete use case with the least privilege principle on Google Cloud using modular Terraform, Terragrunt and Cloud Build
gcloud script to provision my GKE cluster, in a secure way
TOTP MFA for teams: Shamir's Secret Sharing and zero trust OTP generation
Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
📚 ☁️ For Architects and Engineers ☁️ 📚
Add a description, image, and links to the least-privilege topic page so that developers can more easily learn about it.
To associate your repository with the least-privilege topic, visit your repo's landing page and select "manage topics."